Academia.eduAcademia.edu

Outline

A survey of blockchain from security perspective

2019, Journal of Banking and Financial Technology

https://doi.org/10.1007/S42786-018-00002-6

Abstract

The report starts with an overview of the blockchain security system and then highlights the specific security threats and summarizes them. We review with some comments and possible research direction. This survey, we examines the security issues of blockchain model related technologies and their applications. The blockchain is considered a still growing like the internet in 1990. It has the potential to disrupt so many technology areas in the future. But as a new underdeveloped field, it is suffering many setbacks mostly resulting from the security area. Its security concerns coming not only from distributed/ decentralized computing issue or Cryptography algorithm issue, from some unexpected field too. Here, in this paper, we tried to classify the security concerns for the blockchain based on our survey from recent research papers. We also tried to show which way blockchain development trends are going.

References (68)

  1. Amine Ferrag M, Derdour M, Mukherjee M, Derhab A (2018) Blockchain technologies for the internet of things: research issues and challenges. IEEE, New York
  2. Avanade (2018) Cloud solutions that deliver the speed you need to become a digital business. Avanade, Seattle
  3. Bahri L, Carminati B, Ferrari E (2018) Decentralized privacy preserving services for online social networks. Online Soc Netw Media 6:18-25
  4. Bennett R, Pickering M, Sargent J (2018) Innovations in land data governance: unstructured data, nosql, blockchain, and big data analytics unpacked. In: Land and poverty conference 2018. Land governance in an interconnected world, Washington, DC, 19-23 Mar 2018
  5. Bernstein DJ, Lange T (2014) Safecurves: choosing safe curves for elliptic-curve cryptography. University of Illinois, Chicago
  6. Boireau O (2018) Securing the blockchain against hackers. Netw Secur 2018(1):8-11
  7. Buntinx J (2017) What is bitcoin fungibility. The Merkle, London
  8. Foundation E (ed.) (n.d.) Privacy on the Blockchain. Retrieved November 01, 2018, from https ://blog.ether eum.org/2016/01/15/ priva cy-on-the-block chain /
  9. Buterin V (n.d.) Ethereum Project. Retrieved November 1, 2018, from http://www.ether eum.org/
  10. Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. IEEE P2P 2013 Proceedings, pp. 1-10
  11. Choo R, He X, Lin C, He D, Vasilakos AV (2018) Bsein: a block- chain-based secure mutual authentication with fine-grained access control system for industry 4.0. Netw Comput Appl 116:42-52
  12. Carey JE, Gerard SN (2018) U.S. Patent Application No. 15/374,493
  13. Chen Y, Li Q, Wang H (2018) Towards Trusted Social Networks with Blockchain Technology. arXiv preprint: arXiv :1801.02796
  14. Cichosz SL, Stausholm MN, Kronborg T, Vestergaard P, Hejlesen O (2018) How to use blockchain for diabetes health care data and access management: an operational concept. J Diab Sci technol. https ://doi.org/10.1177/19322 96818 79028 1
  15. Cimpanu C (2017) 74% of all Bitcoin-Related Sites Suffered a DDoS Attack. Retrieved November 1, 2018, from https ://www. bleep ingco mpute r.com/news/secur ity/74-perce nt-of-all-bitco in-relat ed-sites -suffe red-a-ddos-attac k/
  16. Clauson KA, Breeden EA, Davidson C, Mackey TK (2018) Lev- eraging blockchain technology to enhance supply chain manage- ment in Healthcare. Blockchain in Healthcare Today
  17. Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoper- ability of electronic health records using blockchain technology. Sustain Cities Soc 39:283-297
  18. Dataeum: First Blockchain Solution that Produces 100% Accu- rate Data through Crowdsourcing (2018) Retrieved November 1, from https ://www.cnbca frica .com/apo/2018/04/12/datae um-first -block chain -solut ion-that-produ ces-100-accur ate-data-throu gh- crowd sourc ing/
  19. de Vries A (2018) Bitcoin's growing energy problem. Joule 2(5):801-805
  20. Android random number flaw implicated in Bitcoin thefts (2013) Retrieved November 1, 2018, from https ://naked secur ity.sopho s.com/2013/08/12/andro id-rando m-numbe r-flaw-impli cated -in-bitco in-theft s/
  21. Ducklin P (2018) What are "WannaMine" attacks, and how do I avoid them? Retrieved from https ://naked secur ity.sopho s.com/2018/01/31/what-are-wanna mine-attac ks-and-how-do-i- avoid -them/
  22. Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. arXiv preprint arXiv :1803.02887
  23. Funk E, Riddell J, Ankel F, Cabrera D (2018) Blockchain technol- ogy: a data framework to improve validity, trust, and accountabil- ity of information exchange in health professions education. Acad Med 93(12):1791-1794
  24. Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A block- chain-based privacy-preserving payment mechanism for vehicle- to-grid networks. IEEE Network, New York
  25. Gräther W, Kolvenbach S, Ruland R, Schütte J, Torres C, Wend- land F (2018) Blockchain for education: lifelong learning pass- port. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
  26. Grover LK (1996) Fast quantum mechanical algorithm for data- base search. In: ACM symposium on the theory of computing, pp 212-219
  27. Grover LK (1997) Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett 78:325-328
  28. Hegadekatti V, Hegadekatti K (2018) Blockchain applications in medical sciences. Int J Sci Res 7(4)
  29. Heilman E, Zohar A, Goldberg S (2015) Eclipse attacks on bit- coin's peer-to peer network. In: USENIX conference on security symposium, pp 129-144
  30. Huang X, Xu C, Wang P, Liu H (2018) LNSC: a security model for electric vehicle and charging pile management based on block- chain ecosystem. IEEE Access 6:13565-13574
  31. Hunt GD, Koved L (2018) U.S. Patent Application No. 15/372,068
  32. IDC (2012) Executive summary: a universe of opportunities and challenges. IDC, Framingham
  33. Jain A, Jain A, Chauhan N, Singh V, Thakur N (2018) Seguro Digital storage of documents using Blockchain
  34. Jiao Y, Wang P, Niyato D, Xiong Z (2018) Social welfare maximi- zation auction in edge computing resource allocation for mobile blockchain. In: 2018 IEEE international conference on commu- nications (ICC), pp 1-6. IEEE, New York
  35. Kim H-W, Jeong Y-S (2018) Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Hum-Centric Com- put Inf Sci 8(1):11
  36. Lee J-H (2018) Bidaas: blockchain based id as a service. IEEE Access 6:2274-2278
  37. Li GD, Jenni Kassem M (2018) Blockchain in the built environ- ment: analysing current applications and developing an emergent framework. Northumbria, Newcastle
  38. Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu J-N, Xiang Y, Deng RH (2017) Crowdbc: a blockchain-based decentralized framework for crowdsourcing. In: Technical report, IACR Cryp- tology, ePrint archive, University of California, Santa Barbara, vol 444
  39. Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pp 468-477. IEEE Press, New York
  40. Lin C, He D, Huang X, Choo K-KR, Vasilakos A V (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42-52
  41. Lu Y, Tang Q, Wang G (2018) Zebralancer: private and anony- mous crowdsourcing system atop open blockchain. arXiv preprint: arXiv :1803.01256
  42. Maria A, Zohar V (2017) Hijacking bitcoin: routing attacks on cryptocurrencies,. In: IEEE symposium on security and privacy, pp 375-392
  43. Menn J (2013) Exclusive: secret contract tied NSA and security industry pioneer. Retrieved November 1, 2018, from https ://www. reute rs.com/artic le/us-usa-secur ity-rsa/exclu sive-secre t-contr act- tied-nsa-and-secur ity-indus try-pione er-idUSB RE9BJ 1C220 13122 0
  44. Musch M, Wressnegger C, Johns M, Rieck K (2018) Web-based cryptojacking in the wild. arXiv preprint: arXiv :1808.09474
  45. Nowiński W, Kozma M (2017) How can blockchain technol- ogy disrupt the existing business models? Entrep Bus Econ Rev 5(3):173-188
  46. List Of High Profile Cryptocurrency Hacks So Far (August 24th 2017). (2017, August 24). Retrieved Novem- ber 1, 2018, from http://storeofvalueblog.com/posts/ cryptocurrency-hacks-so-far-august-24th/
  47. Otte P, de Vos M, Pouwelse J (2017) Trustchain: a sybil-resistant scalable blockchain. Future Gener Comput Syst
  48. Keutmann (2018) Keutmann/Trustchain. Retrieved November 1, 2018, from https ://githu b.com/keutm ann/Trust chain
  49. Poon J, Buterin V (2017) Plasma: Scalable autonomous smart contracts. White paper
  50. Prinz W (2018) Blockchain and CSCW-shall we care? In: Pro- ceedings of 16th European conference on computer-supported cooperative work-exploratory papers. European Society for Socially Embedded Technologies (EUSSET)
  51. Qin D, Wang C, Jiang Y (2018) Rpchain: a blockchain-based aca- demic social networking service for credible reputation building. In: International conference on blockchain. Springer, New York, pp 183-198
  52. The IRS Has a Way to ID Bitcoin Tax Cheats (n.d.) Retrieved November 1, 2018, from http://fortu ne.com/2017/08/22/irs-tax- cheat s-bitco in-chain alysi s/
  53. Schneier on Security (2007) Retrieved November 1, 2018, from https ://www.schne ier.com/essay s/archi ves/2007/11/did_nsa_ put_a_secre t.html
  54. Schneier NFB (2003) Practical cryptography. Wiley, Indianapolis
  55. Shah SN (2018) Distributed electronic document review in a blockchain system and computerized scoring based on textual and visual feedback, 16 Jan 2018. US patent 9870591
  56. Nilsson K (2017) Breaking open the MtGox case, part 1. Retrieved November 1, 2018, from https ://blog.wizse c.jp/2017/07/break ing- open-mtgox -1.html
  57. Stevens M, Pierre K, Albertini A, Markov Y, Bursztein E (2017) The first collision for full SHA-1. In: Katz J, Shacham H (eds) Advances in cryptology-crypto 2017. Springer, New York
  58. Swan M, Brunswicker S (2018) Blockchain economic networks and algorithmic trust. In: AMCIS 2018
  59. Turkanović M, Hölbl M, Košič K, Heričko M, Kamišalić A (2018) Eductx: a blockchain-based higher education credit platform. IEEE Access 6:5112-5127
  60. University Stanford (2011) Pertinent side channel attacks on ellip- tic curve cryptographic systems. Stanford University, Stanford
  61. Vo HT, Kundu A, Mohania MK (2018) Research directions in blockchain data management and analytics. In: EDBT, pp 445-448
  62. Wang F (2015) Eclipse attacks on bitcoin's peer-to-peer network. https ://mediu m.com/mit-secur ity-semin ar/eclip se-attac ks-on-bitco in-s-peer-to-peer-netwo rk-e0da7 97302 c2
  63. Wang Q, Qin B, Hu J, Xiao F (2017) Preserving transaction privacy in bitcoin. Future Generation Comput Syst. https ://doi. org/10.1016/j.futur e.2017.08.026
  64. Wang S, Taha A, Wang J (2018) Blockchain-assisted crowd- sourced energy systems. arXiv preprint: arXiv :1802.03099
  65. Weaknesses. (n.d.). Retrieved November 1, 2018, from https :// en.bitco in.it/wiki/Weakn esses
  66. Wirth C, Kolain M (2018) Privacy by blockchain design: a block- chain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
  67. Zhang R (2018) Blockchain scalability: prospective solutions for bitcoin, ethereum, and other blockchain networks
  68. Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key manage- ment scheme for health blockchain. CAAI Trans Intell Technol